similar to: Q. on key sniffing/spoofing

Displaying 20 results from an estimated 10000 matches similar to: "Q. on key sniffing/spoofing"

2010 May 07
0
How to prevent IP-spoofing/traffic sniffing by the guest machines?
Hi, In a libvirt/KVM setup, what is the best way to prevent untrusted guest machines from (a) sending packets with a sender address different from their own and (b) reading packets not intended for them? Note that guests may have any number of IP addresses they are allowed to use legitimately. Guido -- Too much multitasking isn't good for you.
2007 May 31
0
Custom CLI (spoofing) ?
I'm trying to have a go at CLI spoofing. My outbound calls may go out over various VoIP providers, using least cost routing to determine which provider for call destination and time of day. No matter which provider I go out over, i'd like the called party to only see only one of my numbers - that number will be the only number i'll want people to call back on. To test, i've
2004 Aug 06
2
a new directory service
> Hopefully.. considering their DSP guy and a handful of others were laid > off.. the new DSP they have really blows too so I'm forced into using the > old one.. oh well. The ogg plugin author was not an employee. He was a contractor. He's still working on the plugin regardless. > Oh that's cool.. and I assume the WMP plugin is available through the wacky > MS
2007 Apr 18
0
[Bridge] ARP spoofing.
Hello all. I know this does not directly relay to Ethernet bridging but I need some advise... anyone want to give me some info/help on the subject. In the interest of multipath routing I need to know if it is possible to do a one-way arp spoof. Lets start with the machines layout... br1------ADSL br2------cisco router-----serial line. br0-----Internal network. I already have
1999 Mar 17
0
CIAC Bulletin J-035: Linux Blind TCP Spoofing
Enjoy.... ugh. Dan ____________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N Batavia, IL
2004 Aug 06
0
a new directory service
At 08:19 PM 10/17/2001 -0600, you wrote: >I apologize for the delay in response time :) > >I got busy. Now I'm back :) Cool, and you replied to me first! ;) > > over and over for every station, wasting screen real estate and > bandwidth both. > >Ah, in general I'm not dicussing here what's shown on screen. Only how >the information is stored and used.
2015 Feb 16
1
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
Hi all Assume that you have a linux bridge with two interfaces eth0 and eth1 enslaved to this bridge What is the difference between sniffing the bridge and sniffing its interfaces? tcpdump -i br0 vs tcpdump -i eth0 Thanks MiniME -------------- next part -------------- An HTML attachment was scrubbed... URL:
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge specific traffic (STP, LLDP) using the interfaces generated by the bridge itself. If you have vlan tagged sub interfaces you might also miss that traffic if you were snooping a particular interface. Obviously you will miss any on-wire broadcast traffic specific to the layer1 connection a particular interface was connected to
2006 May 24
3
Spoofing a BLF Signal?
Is there anyway to "spoof" a BLF signal to a phone from within a dialplan? That being so I can turn a BLF light on or off on a phone when a certain thing happens in a dialplan?
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= CERT(sm) Advisory CA-96.21 Original issue date: September 19, 1996 Last revised: -- Topic: TCP SYN Flooding and IP Spoofing Attacks - ----------------------------------------------------------------------------- *** This advisory supersedes CA-95:01. *** Two
2005 Jan 30
1
Caller ID spoofing
Hello everybody! I am having the following problem and since I am a beginner in playing with asterisk, i can't solve it: I am trying to integrate my existing H.323 network in real world telephony by ISDN cards. The problem is that i DON'T want to change all e164 numbers in my h.323 network and my ISDN provider doesn't accept those identities (CIDs). So, i have to spoof the outgoing
2007 Jun 28
2
Caller ID Spoofing to be banned in the USA
Anyone running caller id spoofing applications in the USA running asterisk? Then it's time to move them to Canada or similar. http://arstechnica.com/news.ars/post/20070627-caller-id-spoofing-about-t o-be-outlawed.html Regards, Dean Collins Cognation Pty Ltd dean at cognation.net <mailto:dean at cognation.net> +1-212-203-4357 Ph +61-2-9016-5642 (Sydney in-dial).
2003 Oct 12
0
idea (and patch): connection cookies
I have an idea for a protocol extension to limit the exposure of the complex crypto code in ssh servers. It's like tcp-wrappers, but based on a secret token rather than IP address. Patch against openssh-3.7.1p2: http://nick.cleaton.net/openssh-cc-0.03.patch Details ======= The "Connection Cookies" mechanism is an unofficial ssh protocol extension designed to prevent attackers
2004 Jun 07
1
Network Sniffing Calls for recording
Ok assuming I don't want to record calls using * but instead want a dedicated server that listens to a mirror port and records calls. Is there a cheap software package out there for doing this for mgcp/sccp? I know if evern cut over to * there is a way but I doubt I will even cut 100% over to * so I was wonder what the list has heard of for call recording via sniffing my gates. I know there
2008 Jan 31
2
Missing packets on Dom0 when sniffing bridge with wireshark/tethreal
Hi, I have a Centos5 machine running xen 3.0.3-41 with two NICs each on its own subnet: 192.168.1.x and 192.168.0.x. All DomUs can talk to each other OK through two xen bridges. There are 3 DomUs: Dom0, Dom1 and Dom2 The scenario: I''m trying to capture packets on Dom2 on 192.168.0.x from external devices that are sending SIP stuff to Dom1, but fail to capture any packets. I
2007 Feb 26
1
About ISP sniffing, trying to undertstand
Hello, I am trying to understand how Tor protect to ISP sniffing in proxy. I suppose this steps: 1) Dowload Tor software, software should signed or downloaded from SSL site. 2) Computer software verify that software is not modified, and install it. 3) Vidalia starts tunnel, At this point how keys are exchanged? ... -- -- Devel in Precio http://www.pas-world.com
2014 Dec 01
2
[Bug 10977] New: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested)
https://bugzilla.samba.org/show_bug.cgi?id=10977 Bug ID: 10977 Summary: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested) Product: rsync Version: 3.1.1 Hardware: All OS: Linux Status: NEW Severity: critical Priority: P5 Component: core
2011 Aug 25
1
security: SIP header spoofing CHANNEL(recvip)?
I am currently suffering various SIP attacks. I am using the following extension to record the caller's IP address: exten => h,n,set(CDR(srcip)=${CHANNEL(recvip)}) However, in recent attacks, this IP address is not correct, and I believe that they are spoofing it. I am using asterisk 1.6.2.15. Does the CHANNEL(recvip) variable record IP show in the SIP header instead of the real, UDP
2013 Nov 19
2
macvtap direct and ip spoofing
Hi there. I have configured kvm domain (rhel6.4) with ethernet bridged over macvtap, and found no filtration applied except mac. 'virsh' just silently ignoring attributes 'filterref' and 'ip address' in different formats. No error on validate stage. Config examples: ... <interface type='direct'> <mac address='52:54:00:31:ae:1a'/>
2005 Jun 05
0
ARP spoofing
Hi All, I have a program that does ARP spoofing (not for hacking purposes!), and I experienced occasional crashes in my switch (Cisco UBR7200). Does anyone else had a similar problem? Maybe with other switches/routers? Can this be the results of two machines trying to register the same IP? Send invalid ARP packets? Thanks, Yuval.